Content area

Abstract

The rapid development of network communication technology has led to an increased focus on the security of image storage and transmission in multimedia information. This paper proposes an enhanced image security communication scheme based on Fibonacci interleaved diffusion and non-degenerate chaotic system to address the inadequacy of current image encryption technology. The scheme utilizes a hash function to extract the hash characteristic values of the plaintext image, generating initial perturbation keys to drive the chaotic system to generate initial pseudo-random sequences. Subsequently, the input image is subjected to a light scrambling process at the bit level. The Q matrix generated by the Fibonacci sequence is then employed to diffuse the obtained intermediate cipher image. The final ciphertext image is then generated by random direction confusion. Throughout the encryption process, plaintext correlation mechanisms are employed. Consequently, due to the feedback loop of the plaintext, this algorithm is capable of resisting known-plaintext attacks and chosen-plaintext attacks. Theoretical analysis and empirical results demonstrate that the algorithm fulfils the cryptographic requirements of confusion, diffusion, and avalanche effects, while also exhibiting a robust password space and excellent numerical statistical properties. Consequently, the security enhancement mechanism based on Fibonacci interleaved diffusion and non-degenerate chaotic system proposed in this paper effectively enhances the algorithm’s resistance to cryptographic attacks.

Full text

Turn on search term navigation

1. Introduction

In recent years, the exponential growth of computer communication technology and network technology has led to a significant increase in the frequency, extent, and speed of data and information transmission via networks [1,2,3,4]. This has led to the emergence of new requirements for a secure transmission environment. Among the various types of data exchanged for information exchange, images present a particularly sensitive case, as they contain a significant amount of valuable information [5,6,7]. Consequently, the utilisation of image encryption technology [8,9,10] can effectively prevent the leakage of crucial data during the transmission process. A plethora of encryption methodologies have been proposed, including image steganography [11,12,13], biometric encoding [14,15], semi-tensor product [16,17,18], bit-level encryption [9,19,20], chaos theory [9,21,22,23] and others [24,25,26,27]. Among these, the unpredictability, pseudo-randomness, and high sensitivity to chaotic initial values make it the most effective and widely used method for image encryption algorithms [28,29,30,31,32].

From an international perspective, numerous scholars have achieved a series of significant theoretical and applied results in the utilization of chaotic systems for image encryption [33,34,35,36]. In existing research on chaotic image encryption, the performance of chaotic systems and algorithms has a significant impact on the security and efficiency of cryptographic systems [19,37,38]. On the other hand, image encryption methods based on Fibonacci have also gradually gained attention. In 2021, Ref. [39] proposed a novel image encryption scheme based on Quasigroup and Fibonacci transform. This scheme employs a novel image encryption structure that can encrypt images of any size. Experimental results have demonstrated the superiority of this scheme. In 2023, Ref. [40] presented a secure image encryption method using Fibonacci and Tribonacci transforms. Experimental results demonstrate that the proposed image encryption algorithm can securely resist various illegal attacks. In 2024, Ref. [41] introduced a reversible fragile watermark model. This model first generates a watermark from the image using DCT transform and then encrypts the watermark using Fibonacci Q matrix technology to enhance the security of the model. Despite some progress in digital image encryption research in this area, the algorithms designed still have certain limitations due to inherent flaws in encryption systems [21,42]. From a security perspective, existing pixel-level chaotic image encryption algorithms still require further improvement to combat various illegal attacks. Continued research in this field is of great significance for protecting user data privacy [43,44,45], ensuring data integrity, and defending against various forms of attacks [46,47,48]. It is expected to provide more innovative solutions for the development of information security [49,50,51] and secure digital image transmission.

This paper presents a novel image privacy protection scheme based on Fibonacci interleaved diffusion and non-degenerate discrete chaos. Experimental results show that the algorithm exhibits excellent encryption effectiveness and good efficiency. The proposed image encryption algorithm is able to effectively resist various illegal attacks. The main contributions and innovations of the paper are as follows:

This encryption algorithm introduces a novel diffusion mechanism. By leveraging the principles of Fibonacci-related mathematics, a Fibonacci sequence interleaved diffusion method is devised, which effectively resists statistical analysis and enhances the security of encryption.

The majority of existing encryption algorithms are susceptible to potential risks. This image privacy protection scheme employs plaintext correlation to generate dynamic chaotic keys, significantly enhancing the ability to resist cryptographic attacks.

A significant number of the encryption algorithms currently in use are considered to be unreasonable. In the absence of relevant plaintext or ciphertext feedback, they become highly vulnerable to known-plaintext or chosen-plaintext attacks. In order to address this issue, the proposed secure image encryption scheme employs a dynamic feedback mechanism to continuously update encryption keys based on encrypted data. Building upon our current foundation of cryptanalysis research [52,53,54], it enhances security and strengthens the ability to withstand attacks like chosen-plaintext and chosen-ciphertext attacks.

The following section outlines the structure of the remainder of this paper. Section 2 provides an introduction to robust discrete hyper-chaotic systems and the rules of Fibonacci. Section 3 introduces the encryption algorithm designed in this paper. Section 4 presents the experimental and simulation results. The final section presents the conclusion of the paper.

2. Related Theory

2.1. Non-Degenerate Chaotic System

The non-degenerate discrete-time chaotic system [55] was selected for this study due to its simplicity, ease of implementation, and demonstrated chaotic properties. The chaotic system was derived step-by-step from the following formula.

In order to obtain the matrix Ma, which is the result of a transformation of the matrix T, an asymptotically stable nominal system matrix T is required initially. This is achieved by applying a similar transformation to the matrix T using the non-singular matrix N.

(1)Ma=NTN1=0.65000.15000.15000.33000.47000.33000.18000.18000.3200

Consequently, the iterative equation of the system is expressed as follows:

(2)X(k+1)=Ma11X(k)+Ma12Y(k)+Ma13Z(k)Y(k+1)=Ma21X(k)+Ma22Y(k)+Ma23Z(k)Z(k+1)=Ma31X(k)+Ma32Y(k)+Ma33Z(k)

The poles of the nominal system are defined by the unit matrix and the uniform bounded inverse controller. The results of the designed discrete-time chaotic system are presented in Equation (3).

(3)X(k+1)Y(k+1)Z(k+1)=Ma3×3X(k)Y(k)Z(k)+100010001modσX(k),εmodσY(k),εmodσZ(k),ε

The final mathematical formulation of the chaotic system employed in this study is presented below:

(4)X(k+1)=Ma11X(k)+Ma12Y(k)+Ma13Z(k)+modσX(k),εY(k+1)=Ma21X(k)+Ma22Y(k)+Ma23Z(k)+modσY(k),εZ(k+1)=Ma31X(k)+Ma32Y(k)+Ma33Z(k)+modσZ(k),ε

2.2. Fibonacci Q Matrix

The Fibonacci Sequence is a sequence that the mathematician Fibonacci studied using the study of rabbit reproduction as an example, hence its designation as the “Rabbit Sequence”, also known as the Golden Section Sequence. It attracted considerable interest from society as soon as it was proposed. Following research, it was discovered that this sequence, which is characterized by a seemingly magical quality, plays an immeasurably important role. In particular, the sequence begins with 0 and 1, with each subsequent item being the sum of the previous two items. This can be expressed mathematically as follows:

(5)F(0)=0F(1)=1F(n)=F(n1)+F(n2)(n2)

This sequence has a wide range of applications in the fields of mathematics and computing, demonstrating some special mathematical properties and patterns. In this paper, the Fibonacci sequence is combined with image encryption to explore a diffusion method based on this mathematical approach. The specific steps are as follows:

The elements of the Fibonacci sequence are denoted as Fn.

(6)Fn=Fn1+Fn2n3

The initial term of the Fibonacci matrix is as follows:

(7)Q=1110

The n-th power of the Fibonacci matrix is as follows:

(8)Qn=Fn+1FnFnFn1

The inverse matrix of the n-th power of the Fibonacci matrix is as follows:

(9)Qn=Fn1FnFnFn+1

3. The Proposed Encryption Algorithm

In contrast to traditional algorithms, this paper utilizes a discrete hyper-chaotic system and a hash function to generate the chaotic key required for encryption. This enhances the security of the algorithm and increases the difficulty of code breaking. The flowchart depicting the algorithm design is presented in Figure 1.

Take the matrix as an example to encrypt a single channel, and the specific encryption process is shown in Figure 2.

3.1. Chaos Key Generation and Sequence Preprocessing

After extracting features from the plaintext image P using a hash function, we obtain character-based fixed-length hexadecimal numbers. To simplify computation, each number is converted to a decimal number and represented by the variable Hash. The image hash is then mathematically processed to obtain the initial key parameters, which are substituted into the chaotic system to obtain the chaotic sequences S1, S2 and S3.

3.2. Lightweight Bit-Level Permutation

Image scrambling is a commonly employed encryption technique that aligns with the principles of confusion and diffusion as outlined in Shannon’s cryptography theory. This approach can enhance the security performance of encryption algorithms. There are two principal methods for scrambling images: pixel-level scrambling and bit-level scrambling. In pixel-level scrambling, only the pixel positions of the image are altered, while the statistical histogram of the scrambled image remains unchanged. This makes it susceptible to statistical analysis attacks. Bit-level scrambling not only changes the pixel positions of the image but also alters the pixel grayscale values, thereby providing stronger security performance. However, compared to pixel-level scrambling, efficiency is relatively lower for bit-level scrambling. Some researchers have highlighted that only scrambling image encryption schemes are insecure as they are vulnerable to chosen-plaintext or known-plaintext attacks, requiring a considerable amount of plaintext to decipher at least half of the equivalent passwords. The complexity of attacking encryption algorithms that only involve scrambling operations is proportional to the square of the required plaintext quantity. Based on this, a lightweight bit-level image scrambling method is proposed in this article, and Algorithm 1 introduces the specific operational process.

Algorithm 1 Lightweight Bit-level Permutation
Require: Chaotic sequence S1; plaintext image P of size [height,width,3] Ensure: Intermediate ciphertext image C1  1: 

Separate RGB channels: PR=P(:,:,1); PG=P(:,:,2); PB=P(:,:,3)

 2: 

XS1(1:height×3);    YS1(height×3+1:height×3+width×8)

 3: 

[,indexX]sort(X);    [,indexY]sort(Y)

 4: 

Convert channels to binary and reshape:

IR2reshape(dec2bin(PR),height,width×8)IG2reshape(dec2bin(PG),height,width×8)IB2reshape(dec2bin(PB),height,width×8)

 5: 

Stack binary channels: inputP[IR2;IG2;IB2]

 6: 

outputPinputP

 7: 

for i=1 to height×3 do

 8: 

    for j=1 to width×8 do

 9: 

        Swap: outputP(i,j)outputP(indexX(i),indexY(j))

10: 

    end for

11: 

end for

12: 

Split permuted matrix:

ORoutputP(1:height,:)OGoutputP(height+1:2height,:)OBoutputP(2height+1:3height,:)

13: 

Reconstruct channels:

C1(:,:,1)uint8(reshape(bin2dec(OR),height,width))C1(:,:,2)uint8(reshape(bin2dec(OG),height,width))C1(:,:,3)uint8(reshape(bin2dec(OB),height,width))

Step 1: Expand the RGB components of the color plaintext image P with dimensions M×N×3 bit by bit, each with a length of M×8N, represented as Pr, Pg and Pb. Combine the RGB components in top-to-bottom order to form a binary matrix of dimensions M×8N×3, denoted as Prgb.

Step 2: Process the chaotic sequence S1 to generate index sequences rowK and colK. These are used for row and column scrambling of the bit image. By swapping the rows and columns of the image bit matrix, the scrambled bit matrix Prgb is obtained.

Step 3: Resize the scrambled bit matrix for subsequent diffusion operations. The size should be changed from the original 3M×8N back to M×N×3, resulting in the scrambled image denoted as C1.

3.3. Fibonacci Matrix Diffusion

The RGB layering of the permuted image C1 is performed, after which a selection of different Fibonacci number sequence matrices from the chaotic sequence S2 is made, with the intention of diffusing each layer of C1. This results in the diffused image C2. The Fibonacci diffusion algorithm is shown in Algorithm 2, with specific operational steps as follows:

Algorithm 2 Fibonacci Matrix Diffusion
Require: Chaotic matrix FN; intermediate image C1 of size M×N Ensure: Diffused ciphertext image C2  1: 

Rdouble(C1)

 2: 

for i=1 to M step 2 do

 3: 

    for j=1 to N step 2 do

 4: 

        qFN(i,j)

 5: 

        QF(q+1)F(q)F(q)F(q1)

 6: 

        CxR(i:i+1,j:j+1)

 7: 

        C2(i:i+1,j:j+1)Cx×Q

 8: 

    end for

 9: 

end for

10: 

C2mod(C2,256)

Step 1: Reconstruct S2 into a chaotic matrix of the same size as C1, and then preprocess it into integers within the range of [3:21] as follows:

(10)x=reshape((100×S2(1:M×N)),[M,N])FN=round(mod(x,17)+3)

where M and N represent the width and height of the image respectively.

Step 2: Substitute the obtained chaotic matrix FN into the Fibonacci Q matrix constructed by Formula (8) to obtain the matrix Sn.

(11)Sn=F(FN(i,j)+1)F(FN(i,j))F(FN(i,j))F(FN(i,j)1)

where i=(1,3,M1); j=(1,3,N1).

Step 3: Substitute the intermediate ciphertext image C1 into the Fibonacci Q matrix constructed by Formula (8) to obtain the matrix Cx:

(12)Cx=C1(i,j)C1(i,j+1)C1(i+1,j)C1(i+1,j+1)

Step 4: Diffuse the two matrices Sn and Cx obtained block by block.

(13)fz=Sn×Cx

Step 5: The diffused matrix is the ciphertext matrix C.

(14)C(i,j)=fz(1,1)C(i,j+1)=fz(1,2)C(i+1,j)=fz(2,1)C(i+1,j+1)=fz(2,2)

Step 6: Place the values of the ciphertext matrix C in the appropriate range, where C2 is the diffused ciphertext image.

(15)C2=mod(C,256)

3.4. Random Direction Confusion

Convert the chaotic sequence S3 to a chaotic index matrix I of the same size as the intermediate ciphertext C2, then perform 232 power operations on the index matrix I to obtain the operation matrix S. The specific operations are shown in Algorithm 3, and the calculation formula is as follows:

(16)C3(I(x,y),y)=mod(C2(I(x,y),y)+C2(I(M,N),N)+S(I(x,y),y),256)fori=1,j=1C3(I(x,y),y)=mod(C2(I(x,y),y)+C3(I(x1,N),N)+S(I(x,y),y),256)fori=2W,j=1C3(I(x,y),y)=mod(C2(I(x,y),y)+C3(I(x,y1),y1)+S(I(x,y),y),256)fori=1W,j=2W

Algorithm 3 Random Direction Confusion
Require: Computing matrix S; index matrix I; intermediate ciphertext C2 of size M×N Ensure: Final ciphertext C3  1: 

for x=1 to M do

 2: 

    for y=1 to N do

 3: 

        if y=1 then

 4: 

           if x=1 then

 5: 

               C3(I(x,y),y)modC2(I(x,y),y)+C2(I(M,N),N)+S(I(x,y),y),256

 6: 

           else

 7: 

               C3(I(x,y),y)modC2(I(x,y),y)+C3(I(x1,N),N)+S(I(x,y),y),256

 8: 

           end if

 9: 

        else

10: 

           C3(I(x,y),y)modC2(I(x,y),y)+C3(I(x,y1),y1)+S(I(x,y),y),256

11: 

        end if

12: 

    end for

13: 

end for

The encryption process is hereby completed, and C3 is the final ciphertext image. The single-channel decryption flow is shown in Figure 3.

4. Experimental Results and Analysis Discussion

The experimental platform used was a MacBook Pro with MATLAB R2022b laboratory software installed. The device is equipped with a 2.2 GHz quad-core Intel Core i7 processor, 16 GB of RAM, and runs on the Windows 10 operating system. The images presented in this paper are sourced from the USC-SIPI database.

4.1. Histogram Analysis

The histogram illustrates the distribution of each gray level in the image and its corresponding frequency. Generally, the histogram of a plaintext image displays specific statistical patterns, while the histogram of an encrypted image exhibits statistical characteristics similar to a noise distribution. Therefore, effective encryption algorithms can transform the image into a form resembling a noise distribution to conceal the primary information of the image. One plaintext image of each size was selected for histogram testing, as shown in Figure 4. The encrypted image effectively conceals the main information of the plaintext image, preventing attackers from cracking the ciphertext image through statistical analysis.

4.2. The Coefficient of Adjacent Pixels

The objective of image encryption algorithms is to break the correlation between pixels. This prevents attackers from relying on pixel correlation for decryption attempts. This paper uses the ‘Lena’ image as an example to illustrate this process. We randomly selected 3000 pairs of neighboring pixels from the plaintext and ciphertext. Then, we calculated the correlation coefficients of these neighboring pixels in horizontal, vertical, diagonal, and anti-diagonal directions. The scatter plots corresponding to the experiments are displayed in Figure 5, and the results of the correlation analysis are presented in Table 1. The specific calculation formula is as follows:

(17)rxy=cov(x,y)D(x)D(y)cov(x,y)=1Ni=1N(xiE(x))(yiE(y))D(x)=1Ni=1N(xiE(x))2E(x)=1Ni=1Nxi

where xi and yi constitute the i-th pair of horizontal, vertical, diagonal or anti-diagonal neighboring pixels, N is the total number of horizontal/vertical/diagonal/anti-diagonal neighboring pixels, cov(x,y) is the covariance between pixel values x and y, D(x) and D(y) are the pixel value x and pixel value y mean-square error, and E(x) and E(y) are the expected values of pixel value x and pixel value y, respectively. rxy is the correlation coefficient of pixel values x and y.

The findings demonstrate that our encryption algorithm successfully minimizes the correlation between pixels, rendering it almost undetectable in the ciphertext. This provides strong evidence that our proposed encryption algorithm is highly secure.

4.3. Differential Attack Analysis

To evaluate the robustness of the proposed image encryption algorithm against differential attacks, we analyze three key metrics: the Number of Pixels Change Rate (NPCR), the Unified Average Changing Intensity (UACI), and the Bit-level Average Change Intensity (BACI). These metrics are commonly used to measure the sensitivity of the ciphertext to small changes in the plaintext and help determine whether the encryption scheme can effectively resist differential cryptanalysis.

NPCR measures the percentage of pixels that change value when a single pixel in the plaintext is altered. A higher NPCR value indicates stronger diffusion characteristics in the encryption algorithm. NPCR is computed as follows:

(18)NPCR=1M×Ni=1Mj=1ND(i,j)×100%

where M×N is the image size, and D(i,j) is defined as follows:

(19)D(i,j)=0,C1(i,j)=C2(i,j)1,C1(i,j)C2(i,j)

Here, C1 and C2 denote the encrypted images generated from two plaintexts differing by a single pixel.

UACI evaluates the average intensity of differences between the ciphertexts, defined by the following:

(20)UACI=1M×Ni=1Mj=1N|C1(i,j)C2(i,j)|255×100%

A higher UACI value indicates better resistance to differential attacks by ensuring greater changes in pixel intensity.

BACI extends UACI to the bit level, capturing average bit-wise changes between two ciphertexts:

(21)BACI=18×M×Ni=1Mj=1NHamming(C1(i,j),C2(i,j))×100%

where Hamming(·,·) calculates the number of differing bits between corresponding pixel values.

The experiments were conducted by encrypting images of three different sizes, where a single pixel in the plaintext was modified and the corresponding encrypted outputs were compared. The results are listed in Table 4 and Table 2, and the NPCR visualization comparison results are listed in Figure 6, Figure 7, and Figure 8, respectively. The consistently high NPCR, UACI, and BACI values across different resolutions validate the proposed algorithm’s strong resistance against differential attacks.

4.4. Image Quality Analysis

Peak Signal to Noise Ratio (PSNR) and Structural Similarity (SSIM) are frequently used to evaluate the quality of encryption in image processing. PSNR includes Mean Square Error (MSE) as a component, which is defined as follows:

(22)MSE=1H×Wi=1Hj=1W(X(i,j)Y(i,j))2PSNR=10×log10Q2MSE

where MSE represents the mean square error between the plaintext image X and the ciphertext image Y, with H and W representing the height and width of the image, respectively. Q denotes the pixel level of the image.

SSIM is a measure of the similarity between two images, defined as follows:

(23)SSIM(X,Y)=(2μXμY+(0.01L)2)(2σXY+(0.03L)2)(μX2+μY2+(0.01L)2)(σX2+σY2+(0.03L)2)

where μX and μY denote the mean values of image X and Y, respectively. The standard deviation of image X and Y are denoted by σX and σY, respectively. L represents the dynamic range of pixel values.

Equations (22) and (23) are used to calculate the values of MSE, PSNR, and SSIM. Additionally, to ensure generality, several images were selected to test the encryption module. The encrypted images should have a PSNR of less than 10 dB and an SSIM value close to 0. Table 4 and Table 3 details the results of the tests. The experimental results demonstrate the excellent encryption performance of our algorithm.

4.5. Information Entropy Analysis

In image encryption, information entropy serves as a vital measure, representing the extent of uncertainty linked to image data and commonly serving to assess the randomness within the system. A higher information entropy value suggests enhanced uncertainty and diminished visibility of image data, indicating better encryption efficacy of the algorithm. To illustrate, a contrast was drawn between the information entropy of the initial and encrypted images. For the information source m, the information entropy H(m) can be calculated using the following equation:

(24)H(m)=i=1Lp(mi)log2p(mi)

where L is the total number of symbols m(i)m and p(mi) denotes the probability of the symbols. From Table 4, we can see that the experimental results are close to 8, so the proposed algorithm has good information entropy properties.

4.6. Key Space Analysis

Cryptography experts emphasize that to effectively resist brute-force attacks, the key length of chaotic encryption systems should be no less than 128 bits. In the chaotic system used in this paper [55], the key space is defined as

(25)S{aij,δi,ϵi,xi(0),Hash256},i,j=1,2,3,

which comprises a total of 55 key parameters, including the nominal system parameters of the non-degenerate hyper-chaotic system, parameters of the feedback controller, initial conditions of four distinct key types, and the SHA-2 hash value.

Based on experimental analysis, the effective key lengths are as follows: the nominal system parameters provide a key space of approximately 1016×92144, the feedback controller parameters contribute around 1011×6=10662219, the initial chaotic values account for roughly 1017+16+15=10482159, and the SHA-2 hash value itself corresponds to a key length of 2256. Summing these components yields a total key length of

144+219+159+256=778bits.

4.7. Analysis of Plaintext Sensitivity

The sensitivity of plaintext refers to the extent of ciphertext changes observed when operating on the pixels of plaintext. Insufficient sensitivity of plaintext in encryption algorithms can increase the risk of leakage, and plaintext sensitivity plays an important role in enhancing the algorithm’s ability to resist plaintext attacks. In this section, four pixels of plaintext images are randomly selected and the encryption effects of the original image and the processed plaintext image are compared, with the results shown in Table 5. The experimental results using images of different sizes are shown in Figure 9, Figure 10 and Figure 11. From the experimental data, it can be seen that the algorithm proposed in this research has good plaintext sensitivity.

4.8. Theoretical Security Analysis of Fibonacci Diffusion

4.8.1. Effective Nonlinearity Through Dynamic Matrix Diffusion

The proposed diffusion mechanism utilizes a block-wise transformation:

CxSn·Cxmod256

where Cx is a 2×2 pixel block, and Sn is a Fibonacci Q-matrix of power n (as defined in Equation (8)). Although the transformation is linear per block, the use of a dynamically changing matrix Sn—with indices determined by the chaotic matrix FN(i,j)—induces system-level nonlinearity.

Two key cryptographic properties are introduced:

Exponential Amplification: Elements of Sn follow the Fibonacci recurrence F(n)=F(n1)+F(n2), with growth rate Θ(ϕn), where ϕ=1+521.618. As n increases, even minor differences in Cx are exponentially amplified.

Path Confusion: The dynamic index FN(i,j), derived from a chaotic sequence S2, assigns a unique matrix Sn to each block, disrupting any attempt at consistent linear modeling across the image.

The scheme therefore achieves confusion in Shannon’s sense, while retaining invertibility via Qn (Equation (9)).

4.8.2. Resistance to Differential Cryptanalysis

Let ΔCx be a one-pixel input difference, with ΔCx1=1. The output difference is as follows:

δ=Sn·ΔCxmod256

We approximate the expected Hamming weight of δ as follows:

E[δ1]14k=14j=14|Sk,jn|=Θ(ϕn)

This implies that at least 0.7n bits are expected to change on average. Given n[3,21], the minimum expected bit change satisfies the following:

minn3E[δ1]>2.1bitsNPCR>99.6%

This theoretical bound corroborates the empirical values reported in Section 4.3, confirming robustness against differential attacks.

4.8.3. Key Sensitivity Analysis

Assuming a one-step tampering of the chaotic index, i.e., n=n±1, the deviation in the transformation matrix is quantified by the Frobenius norm:

SnSnF|F(n+1)F(n)|=F(n1)

For n7, F(n1)>256. This yields a pixel change probability approximated by an exponential decay model:

P(pixelchange)1eF(n1)/64>98.2%

This estimation reflects the high diffusion sensitivity to minor key variations. Since FN(i,j) is derived from S2 via the following:

FN(i,j)=round(mod(100·S2(i,j),17)+3)

recovering n requires inversion of the chaotic map, which for a 128-bit key space implies a brute-force complexity of Ω(2128), ensuring resistance against chosen-plaintext attacks.

4.8.4. Resistance to Algebraic Attacks

The Fibonacci recurrence F(n)=F(n1)+F(n2) introduces algebraic structure, which may suggest susceptibility to equation-solving attacks. However, the encryption structure effectively prevents this by the following:

Each 2×2 block generates four linear equations but includes six unknowns: four matrix entries of Sn and two plaintext variables.

The chaotic index n differs per block, preventing consistent coefficient reuse and eliminating possibilities of system-wide equation alignment.

The modular reduction operation (mod256) introduces nonlinear discontinuities (wrap-around effects), further complicating algebraic inference.

Hence, any system of equations derived from known-plaintext attacks becomes underdetermined, nonuniform, and nonlinear, rendering algebraic cryptanalysis infeasible in practice.

4.9. Cryptanalysis of the Proposed Encryption Algorithm

To evaluate the robustness of the proposed Fibonacci-chaos encryption scheme against chosen-plaintext attacks (CPA), we conducted a targeted cryptanalysis experiment based on our previous cryptanalytic research framework [52,53,54]. In a CPA scenario, an adversary can arbitrarily select plaintext images and obtain their corresponding ciphertexts, which is particularly effective in revealing structural weaknesses in diffusion mechanisms. Our methodology employs uniform-color test images—known to expose deterministic patterns in Fibonacci-based diffusion systems.

Four monochromatic images of size 512×512×3 were generated with all pixel values set to the following:

170 (10101010): Probes alternating bit patterns.

255 (11111111): Evaluates all-one input handling.

We encrypted the uniform-color test images using the proposed algorithm. As shown in Figure 12, the resulting ciphertext images exhibit snow-like randomness, with no visible patterns or structural biases, indicating strong confusion and diffusion effects. Experimental results affirm that the proposed scheme withstands chosen-plaintext attacks.

4.10. Run Time Analysis

To evaluate the computational efficiency of the proposed image encryption scheme, we conducted experiments on a PC equipped with an AMD 5950X processor, 128 GB RAM, and 8TB storage, using MATLAB R2025a. The experiments involved repeatedly encrypting standard RGB images of sizes 256 × 256 × 3 and 512 × 512 × 3, with the average execution time calculated over multiple iterations. The results are summarized in Table 6, which compares the proposed method against several recent schemes, including AES and state-of-the-art algorithms from 2024 and 2025. As demonstrated in Table 6, the proposed method significantly outperforms conventional encryption standards like AES in computational speed. These results clearly indicate that the proposed scheme is not only secure and effective but also highly efficient, making it suitable for real-time image encryption applications.

5. Conclusions

This paper proposes an image security communication enhancement scheme based on Fibonacci interleaved diffusion and non-degenerate discrete chaos. The scheme utilizes a hash function to extract the hash characteristic values of the plaintext image, generates an initial perturbation key-driven chaotic system to produce an initial pseudo-random sequence, and then applies a lightweight bit-level scrambling to the input image. The intermediate ciphertext image is then subjected to diffusion and random permutation using the Fibonacci Q matrix, resulting in the final ciphertext image. Throughout the encryption process, a plaintext correlation mechanism is employed. Consequently, due to the feedback loop of the plaintext, the algorithm is capable of resisting known-plaintext and chosen-plaintext attacks. Experimental results demonstrate that our proposed algorithm exhibits high security and robustness, with strong resistance to various cryptographic attacks. Consequently, the image encryption algorithm proposed in this paper represents a preferred security communication technology solution, with broad prospects for applications such as secure transmission of multimedia information in big data environments.

Author Contributions

Z.X. is mainly responsible for the supervision and leadership of the planning and implementation of scientific research activities. Z.X. and W.X. are mainly responsible for the research design and code writing and article writing. Y.L. and W.C. are mainly responsible for literature search and format proofreading. Z.Y. and X.C. are mainly responsible for Latex typesetting and drawing. All authors have read and agreed to the published version of the manuscript.

Institutional Review Board Statement

Not applicable.

Informed Consent Statement

Not applicable.

Data Availability Statement

The datasets used and analyzed during the current study available from the corresponding author on reasonable request. All data generated or analyzed during this study are included in this article.

Conflicts of Interest

The authors declare no competing interests.

Footnotes

Disclaimer/Publisher’s Note: The statements, opinions and data contained in all publications are solely those of the individual author(s) and contributor(s) and not of MDPI and/or the editor(s). MDPI and/or the editor(s) disclaim responsibility for any injury to people or property resulting from any ideas, methods, instructions or products referred to in the content.

Figures and Tables

Figure 1 The proposed algorithm flowchart.

View Image -

Figure 2 Single-channel encryption example.

View Image -

Figure 3 Single-channel decryption example.

View Image -

Figure 4 Plaintext and ciphertext images and corresponding histograms. (a) Plain-images. (b) Histograms of (a). (c) Encryption results of (a). (d) Histograms of (c). (e) Decryption results of (c).

View Image -

Figure 5 Adjacent pixels’ correlation of plaintext image and ciphertext image. (a) R channel; (b) G channel; (c) B channel.

View Image -

Figure 6 The NPCR test values for different channels of 256 × 256 size image.

View Image -

Figure 7 The NPCR test values for different channels of 512 × 512 size image.

View Image -

Figure 8 The NPCR test values for different channels of 1024 × 1024 size image.

View Image -

Figure 9 Plaintext sensitivity test results for images of size 256 × 256.

View Image -

Figure 10 Plaintext sensitivity test results for images of size 512 × 512.

View Image -

Figure 11 Plaintext sensitivity test results for images of size 1024 × 1024.

View Image -

Figure 12 Cryptanalysis of the proposed encryption algorithm.

View Image -

Neighboring pixel correlation values for plaintext and ciphertext image in different directions.

Component Direction Original Image Proposed
  Horizontal 0.9882 0.0010
R channel Vertical 0.9821 0.0036
  Diagonal 0.9651 −0.0201
  Anti-diagonal 0.9741 0.0071
  Horizontal 0.9820 −0.0031
G channel Vertical 0.9668 0.0059
  Diagonal 0.9556 −0.0471
  Anti-diagonal 0.9683 −0.0002
  Horizontal 0.9589 −0.0505
B channel Vertical 0.9321 0.0175
  Diagonal 0.9158 −0.0121
  Anti-diagonal 0.9295 −0.0443

Comparison of NPCR values between different algorithms.

Filename Proposed Ref. [56] Ref. [57] Ref. [58] Ref. [59]
Airplane 99.6075 99.6283 99.6330 99.6092 /
Couple 99.6140 99.5845 / / 99.6130
House 99.6017 99.6296 99.6399 99.6128 99.6110
Mandrill 99.6143 99.6296 / 99.6131 99.6110
Peppers 99.6178 99.6236 99.6174 99.6071 /
San Diego 99.6052 99.6291 99.6172 / /
Tree 99.5926 99.6074 / / /
Female 99.6109 / 99.5880 / /
Oakland 99.6088 / 99.6147 / /
Stockton 99.6093 / 99.6066 / /

Comparison of information entropy between different algorithms.

Filename Proposed Ref. [56] Ref. [57] Ref. [58] Ref. [59]
Airplane 7.9998 7.9983 7.9994 7.9992 /
Couple 7.9989 7.9987 / / 7.9973
House 7.9989 7.9988 7.9978 7.9994 7.9968
Mandrill 7.9998 7.9986 / 7.9992 7.9992
Peppers 7.9998 7.9992 7.9994 7.9989 7.9971
San Diego 7.9998 7.9995 7.9998 / /
Tree 7.9990 7.9994 / / /
Female 7.9990 / 7.9974 / 7.9971
Oakland 7.9999 / 7.9998 / /
Stockton 7.9999 / 7.9998 / /

Results of the proposed encryption system: NPCR, UACI, BACI, MSE, PSNR, SSIM, information entropy.

Filename Description Size Channel NPCR UACI BACI MSE PSNR SSIM HI HC
4.1.01 Female (NTSC test image) 256 Red 99.5789 32.0279 24.5693 36,350 2.5258 0.0094 6.8981 7.9992
4.1.01 Female (NTSC test image) 256 Green 99.6155 36.2976 27.4752        
4.1.01 Female (NTSC test image) 256 Blue 99.6384 37.4646 28.2366        
4.1.02 Couple (NTSC test image) 256 Red 99.6338 38.3150 28.5548 46,240 1.4806 0.0062 6.2945 7.9989
4.1.02 Couple (NTSC test image) 256 Green 99.6140 41.1581 30.5070        
4.1.02 Couple (NTSC test image) 256 Blue 99.6140 41.5659 30.7450        
4.1.03 Female (from Bell Labs?) 256 Red 99.6216 27.0281 19.0294 19,733 5.1789 0.0118 5.9709 7.9991
4.1.03 Female (from Bell Labs?) 256 Green 99.5850 26.6231 18.6229        
4.1.03 Female (from Bell Labs?) 256 Blue 99.5941 26.7814 18.8846        
4.1.04 Female 256 Red 99.6109 31.0961 23.4600 25,462 4.0718 0.0107 7.4270 7.9990
4.1.04 Female 256 Green 99.5911 30.6080 22.7991        
4.1.04 Female 256 Blue 99.6246 27.4894 19.8438        
4.1.05 House 256 Red 99.6323 27.3262 19.8229 25,063 4.1405 0.0098 7.0686 7.9989
4.1.05 House 256 Green 99.6338 29.9497 22.7503        
4.1.05 House 256 Blue 99.6017 31.3619 23.9620        
4.1.06 Tree 256 Red 99.6323 30.1875 22.9725 29,906 3.3732 0.0100 7.5371 7.9990
4.1.06 Tree 256 Green 99.6368 34.2251 26.7309        
4.1.06 Tree 256 Blue 99.5926 31.6424 24.5670        
4.1.07 Jelly beans 256 Red 99.6078 30.8726 24.4918 27,006 3.8162 0.0102 6.5835 7.9990
4.1.07 Jelly beans 256 Green 99.6246 32.5520 26.0160        
4.1.07 Jelly beans 256 Blue 99.5636 28.1269 21.1757        
4.1.08 Jelly beans 256 Red 99.6292 30.7943 24.3415 26,610 3.8803 0.0099 6.8527 7.9991
4.1.08 Jelly beans 256 Green 99.6490 31.8561 25.1864        
4.1.08 Jelly beans 256 Blue 99.6384 28.3174 21.0733        
4.2.01 Splash 512 Red 99.6136 34.2512 26.5957 33,716 2.8524 0.0100 7.2428 7.9998
4.2.01 Splash 512 Green 99.5983 35.6868 27.4607        
4.2.01 Splash 512 Blue 99.6109 31.9245 25.2354        
4.2.03 Mandrill (a.k.a. Baboon) 512 Red 99.6208 29.9609 22.3660 25,848 4.0065 0.0097 7.7624 7.9998
4.2.03 Mandrill (a.k.a. Baboon) 512 Green 99.6231 28.6218 21.6130        
4.2.03 Mandrill (a.k.a. Baboon) 512 Blue 99.6143 31.2127 23.9263        
4.2.05 Airplane (F-16) 512 Red 99.6143 31.9916 25.0842 31,045 3.2109 0.0099 6.6639 7.9998
4.2.05 Airplane (F-16) 512 Green 99.6075 33.0359 26.0583        
4.2.05 Airplane (F-16) 512 Blue 99.5869 32.7045 25.8280        
4.2.06 Sailboat on lake 512 Red 99.6140 27.9360 20.6481 30,347 3.3097 0.0105 7.7622 7.9998
4.2.06 Sailboat on lake 512 Green 99.5796 34.3896 26.7540        
4.2.06 Sailboat on lake 512 Blue 99.6254 34.3947 27.1026        
4.2.07 Peppers 512 Red 99.6223 28.9599 21.7661 30,327 3.3125 0.0104 7.6698 7.9998
4.2.07 Peppers 512 Green 99.6178 33.8983 25.9169        
4.2.07 Peppers 512 Blue 99.5857 33.7585 25.7967        
house House 512 Red 99.6193 30.1928 23.1123 27,746 3.6989 0.0091 7.4858 7.9998
house House 512 Green 99.6113 31.3346 24.0914        
house House 512 Blue 99.6414 31.1798 23.9693        

Plaintext sensitivity analysis of different images.

  Channel (H/4, W/4) (H × 3/4, W/4) (H/4, W × 3/4) (H×3/4, W × 3/4)
4.1.01 Red 99.5895 99.5941 99.6124 99.6338
4.1.01 Green 99.6353 99.6307 99.5956 99.5712
4.1.01 Blue 99.5972 99.6384 99.6124 99.5895
4.1.02 Red 99.5773 99.5926 99.6323 99.6246
4.1.02 Green 99.6307 99.6017 99.6185 99.6155
4.1.02 Blue 99.5804 99.5667 99.6414 99.6094
4.1.03 Red 99.6140 99.6414 99.6002 99.6246
4.1.03 Green 99.5667 99.5834 99.6094 99.6872
4.1.03 Blue 99.5682 99.5850 99.6155 99.5697
2.1.01 Red 99.6159 99.6067 99.6071 99.6017
2.1.01 Green 99.6307 99.6429 99.6101 99.5945
2.1.01 Blue 99.6216 99.6254 99.6082 99.6178
2.1.02 Red 99.6014 99.6193 99.6357 99.5781
2.1.02 Green 99.6166 99.6025 99.6170 99.6201
2.2.02 Red 99.6089 99.6164 99.6058 99.6119
2.2.02 Green 99.6180 99.6065 99.6064 99.6090
2.2.02 Blue 99.6103 99.6139 99.6077 99.6006
2.2.03 Red 99.6074 99.6130 99.6183 99.5976
2.2.03 Green 99.6119 99.6126 99.6103 99.6076
2.2.03 Blue 99.6099 99.6031 99.6061 99.6064

Comparison of time with different algorithms.

Image Size Time (s)
Ref. [60] Ref. [61] Ref. [62] AES [62] Proposed
512 × 512 × 3 - 0.9447 - - 0.450793
256 × 256 × 3 0.858302 - 1.44177 75.0690 0.11241

References

1. Lai, Q.; Liu, Y.; Yang, L. Image encryption using memristive hyperchaos. Appl. Intell.; 2023; 53, pp. 22863-22881. [DOI: https://dx.doi.org/10.1007/s10489-023-04727-w]

2. Lu, X.; Xie, E.Y.; Li, C. Periodicity Analysis of Logistic Map over Ring Z3n. Int. J. Bifurc. Chaos; 2023; 33, 2350063. [DOI: https://dx.doi.org/10.1142/S0218127423500633]

3. Ma, Y.; Li, C.; Ou, B. Cryptanalysis of an image block encryption algorithm based on chaotic maps. J. Inf. Secur. Appl.; 2020; 54, 102566. [DOI: https://dx.doi.org/10.1016/j.jisa.2020.102566]

4. Zeng, W.; Zhang, C.; Xia, J.; Liang, X.; Lin, Y.; Li, Y.; Wang, S.; Yang, G. Chaotic 4D Modulation with Intrusion Detection for Secure Data Centers. J. Light. Technol.; 2025; pp. 1-10. [DOI: https://dx.doi.org/10.1109/JLT.2025.3579518]

5. Chai, X.; Wang, Y.; Gan, Z.; Chen, X.; Zhang, Y. Preserving privacy while revealing thumbnail for content-based encrypted image retrieval in the cloud. Inf. Sci.; 2022; 604, pp. 115-141. [DOI: https://dx.doi.org/10.1016/j.ins.2022.05.008]

6. Yu, F.; Gong, X.; Li, H.; Wang, S. Differential cryptanalysis of image cipher using block-based scrambling and image filtering. Inf. Sci.; 2021; 554, pp. 145-156. [DOI: https://dx.doi.org/10.1016/j.ins.2020.12.037]

7. Chai, X.; Fu, J.; Gan, Z.; Lu, Y.; Zhang, Y. An image encryption scheme based on multi-objective optimization and block compressed sensing. Nonlinear Dyn.; 2022; 108, pp. 2671-2704. [DOI: https://dx.doi.org/10.1007/s11071-022-07328-3]

8. Kocak, O.; Erkan, U.; Toktas, A.; Gao, S. PSO-based image encryption scheme using modular integrated logistic exponential map. Expert Syst. Appl.; 2023; 237, 121452. [DOI: https://dx.doi.org/10.1016/j.eswa.2023.121452]

9. Toktas, A.; Erkan, U.; Gao, S.; Pak, C. A robust bit-level image encryption based on Bessel map. Appl. Math. Comput.; 2024; 462, 128340. [DOI: https://dx.doi.org/10.1016/j.amc.2023.128340]

10. Gao, S.; Liu, S.; Wang, X.; Wu, R.; Wang, J.; Li, Q.; Tang, X. New image encryption algorithm based on hyperchaotic 3D-IHAL and a hybrid cryptosystem. Appl. Intell.; 2023; 53, pp. 27826-27843. [DOI: https://dx.doi.org/10.1007/s10489-023-04996-5]

11. Li, Q.; Wang, X.; Wang, H.; Ye, X.; Zhou, S.; Gao, S.; Shi, Y. A secure image protection algorithm by steganography and encryption using the 2D-TSCC. Chin. Phys. B; 2021; 30, 110501. [DOI: https://dx.doi.org/10.1088/1674-1056/abfa01]

12. Li, Q.; Ma, B.; Wang, X.; Wang, C.; Gao, S. Image Steganography in Color Conversion. IEEE Trans. Circuits Syst. II Express Briefs; 2024; 71, pp. 106-110. [DOI: https://dx.doi.org/10.1109/TCSII.2023.3300330]

13. Wen, W.; Huang, H.; Qi, S.; Zhang, Y.; Fang, Y. Joint Coverless Steganography and Image Transformation for Covert Communication of Secret Messages. IEEE Trans. Netw. Sci. Eng.; 2024; 11, pp. 2951-2962. [DOI: https://dx.doi.org/10.1109/TNSE.2024.3354941]

14. Liu, H.; Teng, L.; Zhang, Y.; Si, R.; Liu, P. Mutil-medical image encryption by a new spatiotemporal chaos model and DNA new computing for information security. Expert Syst. Appl.; 2023; 235, 121090. [DOI: https://dx.doi.org/10.1016/j.eswa.2023.121090]

15. Wen, H.; Xie, Z.; Wu, Z.; Lin, Y.; Feng, W. Exploring the future application of UAVs: Face image privacy protection scheme based on chaos and DNA cryptography. J. King Saud Univ.—Comput. Inf. Sci.; 2023; 36, 101871. [DOI: https://dx.doi.org/10.1016/j.jksuci.2023.101871]

16. Wang, X.; Gao, S. Image encryption algorithm based on the matrix semi-tensor product with a compound secret key produced by a Boolean network. Inf. Sci.; 2020; 539, pp. 195-214. [DOI: https://dx.doi.org/10.1016/j.ins.2020.06.030]

17. Gao, S.; Wu, R.; Wang, X.; Liu, J.; Li, Q.; Tang, X. EFR-CSTP: Encryption for face recognition based on the chaos and semi-tensor product theory. Inf. Sci.; 2022; 621, pp. 766-781. [DOI: https://dx.doi.org/10.1016/j.ins.2022.11.121]

18. Wang, X.; Gao, S. A chaotic image encryption algorithm based on a counting system and the semi-tensor product. Multimed. Tools Appl.; 2020; 80, pp. 10301-10322. [DOI: https://dx.doi.org/10.1007/s11042-020-10101-6]

19. Zhou, S.; Wei, Y.; Zhang, Y.; Iu, H.; Zhang, H. Image encryption algorithm based on the dynamic RNA computing and a new chaotic map. Integration; 2024; 101, 102336. [DOI: https://dx.doi.org/10.1016/j.vlsi.2024.102336]

20. Vikas,; Parhi, D.R. Chaos-based optimal path planning of humanoid robot using hybridized regression-gravity search algorithm in static and dynamic terrains. Appl. Soft Comput.; 2023; 140, 110236. [DOI: https://dx.doi.org/10.1016/j.asoc.2023.110236]

21. Gao, S.; Iu, H.H.C.; Mou, J.; Erkan, U.; Liu, J.; Wu, R.; Tang, X. Temporal action segmentation for video encryption. Chaos Solitons Fractals; 2024; 183, 114958. [DOI: https://dx.doi.org/10.1016/j.chaos.2024.114958]

22. Xiang, Y.; Xiao, D.; Zhang, R.; Liang, J.; Liu, R. Cryptanalysis and improvement of a reversible data-hiding scheme in encrypted images by redundant space transfer. Inf. Sci.; 2021; 545, pp. 188-206. [DOI: https://dx.doi.org/10.1016/j.ins.2020.08.019]

23. Feng, W.; Zhang, J.; Chen, Y.; Qin, Z.; Zhang, Y.; Ahmad, M.; Woźniak, M. Exploiting robust quadratic polynomial hyperchaotic map and pixel fusion strategy for efficient image encryption. Expert Syst. Appl.; 2024; 246, 123190. [DOI: https://dx.doi.org/10.1016/j.eswa.2024.123190]

24. Gao, S.; Iu, H.H.C.; Wang, M.; Jiang, D.; El-latif, A.; Wu, R.; Tang, X. Design, Hardware Implementation, and Application in Video Encryption of the 2D Memristive Cubic Map. IEEE Internet Things J.; 2024; 11, pp. 21807-21815. [DOI: https://dx.doi.org/10.1109/JIOT.2024.3376572]

25. Gao, S.; Wu, R.; Wang, X.; Liu, J.; Li, Q.; Wang, C.; Tang, X. Asynchronous Updating Boolean Network Encryption Algorithm. IEEE Trans. Circuits Syst. Video Technol.; 2023; 33, pp. 4388-4400. [DOI: https://dx.doi.org/10.1109/TCSVT.2023.3237136]

26. Li, Q.; Li, Q.; Ling, B.; Pun, C.M.; Huang, G.; Yuan, X.; Zhong, G.; Ayouni, S.; Chen, J. DPPAD-IE: Dynamic Polyhedra Permutating and Arnold Diffusing Medical Image Encryption Using 2D Cross Gaussian Hyperchaotic Map. IEEE Trans. Consum. Electron.; 2025; early access [DOI: https://dx.doi.org/10.1109/tce.2025.3547429]

27. Xing, Z.; Lam, C.T.; Yuan, X.; Im, S.K.; Machado, P. MMQW: Multi-Modal Quantum Watermarking Scheme. IEEE Trans. Inf. Forensics Secur.; 2024; 19, pp. 5181-5195. [DOI: https://dx.doi.org/10.1109/TIFS.2024.3394768]

28. Xu, X.; Zhang, T.; Zhao, Y.; Dai, W.; Wu, S.; Li, G. Application of two general Memristor models in chaotic systems. Memristors—The Fourth Fundamental Circuit Element—Theory, Device, and Applications; IntechOpen: Rijeka, Croatia, 2023.

29. Gu, Y.; Li, G.; Xu, X.; Song, X.; Wu, S. Multistable dynamics and attractors self-reproducing in a new hyperchaotic complex Lü system. Chaos Interdiscip. J. Nonlinear Sci.; 2023; 33, 093112. [DOI: https://dx.doi.org/10.1063/5.0158163] [PubMed: https://www.ncbi.nlm.nih.gov/pubmed/37695926]

30. He, P.; Liu, H.; Li, G.; Xu, X.; Gu, Y. A general method for generating multi-scroll and multi-wing chaotic systems and its implementation of attractor reproduction. Phys. Scr.; 2023; 98, 085232. [DOI: https://dx.doi.org/10.1088/1402-4896/ace6db]

31. Zheng, H.; Li, G.; Xu, W.; Zhong, H.; Xu, X. A compressive sensing encryption scheme for dual color images based on discrete memristor map and Rubik’s cube scramble. Optik; 2023; 286, 170991. [DOI: https://dx.doi.org/10.1016/j.ijleo.2023.170991]

32. Wu, S.; Li, G.; Xu, W.; Xu, X.; Zhong, H. Modelling and dynamic analysis of a novel seven-dimensional Hamilton conservative hyperchaotic systems with wide range of parameter. Phys. Scr.; 2023; 98, 055218. [DOI: https://dx.doi.org/10.1088/1402-4896/accd2c]

33. Xie, Z.; Lin, Y.; Liu, T.; Wen, H. Face privacy protection scheme by security-enhanced encryption structure and nonlinear dynamics. iScience; 2024; 27, 110768. [DOI: https://dx.doi.org/10.1016/j.isci.2024.110768]

34. Zhou, S.; Zhang, Q.; He, S.; Zhang, Y. What is the lowest cost to calculate the Lyapunov exponents from fractional differential equations?. Nonlinear Dyn.; 2025; 113, pp. 14825-14871. [DOI: https://dx.doi.org/10.1007/s11071-025-10940-8]

35. Zeng, W.; Zhang, C.; Liang, X.; Xia, J.; Lin, Y.; Lin, Y. Intrusion Detection-Embedded Chaotic Encryption via Hybrid Modulation for Data Center Interconnects. Opt. Lett.; 2025; 50, pp. 4450-4453. [DOI: https://dx.doi.org/10.1364/OL.566608] [PubMed: https://www.ncbi.nlm.nih.gov/pubmed/40591342]

36. Gao, S.; Iu, H.H.; Erkan, U.; Şimşek, C.; Toktas, A.; Cao, Y.; Wu, R.; Mou, J.; Li, Q.; Wang, C. A 3D Memristive Cubic Map with Dual Discrete Memristors: Design, Implementation, and Application in Image Encryption. IEEE Trans. Circuits Syst. Video Technol.; 2025; early access

37. Zeng, W.; Zhang, C.; Liang, X.; Lin, Y.; Xia, J.; Li, Y. A Novel Secure Key Stream Generator Based on Chaotic Multi-State Cellular Automata. IEEE Internet Things J.; 2025; 1. [DOI: https://dx.doi.org/10.1109/JIOT.2025.3591682]

38. Lin, Y.; Xie, Z.; Chen, T.; Cheng, X.; Wen, H. Image privacy protection scheme based on high-quality reconstruction DCT compression and nonlinear dynamics. Expert Syst. Appl.; 2024; 257, 124891. [DOI: https://dx.doi.org/10.1016/j.eswa.2024.124891]

39. Kumar, S. Image data security using Quasigroup combined with Fibonacci Q-transformation. J. Inf. Secur. Appl.; 2021; 61, 102941. [DOI: https://dx.doi.org/10.1016/j.jisa.2021.102941]

40. Maiti, C.; Dhara, B.C.; Umer, S.; Asari, V. An Efficient and Secure Method of Plaintext-Based Image Encryption Using Fibonacci and Tribonacci Transformations. IEEE Access; 2023; 11, pp. 48421-48440. [DOI: https://dx.doi.org/10.1109/ACCESS.2023.3276723]

41. Bouarroudj, R.; Souami, F.; Zohra Bellala, F.; Zerrouki, N. A reversible fragile watermarking technique using fourier transform and Fibonacci Q-matrix for medical image authentication. Biomed. Signal Process. Control; 2024; 92, 105967. [DOI: https://dx.doi.org/10.1016/j.bspc.2024.105967]

42. Wen, H.; Lin, Y.; Xie, Z.; Liu, T. Chaos-based block permutation and dynamic sequence multiplexing for video encryption. Sci. Rep.; 2023; 13, 14721. [DOI: https://dx.doi.org/10.1038/s41598-023-41082-9]

43. Zhou, Y.; Bao, L.; Chen, C.P. A new 1D chaotic system for image encryption. Signal Process.; 2014; 97, pp. 172-182. [DOI: https://dx.doi.org/10.1016/j.sigpro.2013.10.034]

44. Chai, X.; Tang, Z.; Gan, Z.; Lu, Y.; Wang, B.; Zhang, Y. SE-NDEND: A novel symmetric watermarking framework with neural network-based chaotic encryption for Internet of Medical Things. Biomed. Signal Process. Control; 2024; 90, 105877. [DOI: https://dx.doi.org/10.1016/j.bspc.2023.105877]

45. Zeng, W.; Zhang, C.; Liang, X.; Luo, Y.; Wang, X.; Qiu, K. Chaotic phase noise-like encryption based on geometric shaping for coherent data center interconnections. Opt. Express; 2023; 32, pp. 1595-1608. [DOI: https://dx.doi.org/10.1364/OE.506738]

46. Li, C.; Lin, D.; Feng, B.; Lü, J.; Hao, F. Cryptanalysis of a Chaotic Image Encryption Algorithm Based on Information Entropy. IEEE Access; 2018; 6, pp. 75834-75842. [DOI: https://dx.doi.org/10.1109/ACCESS.2018.2883690]

47. Xie, E.Y.; Li, C.; Yu, S.; Lu, J. On the cryptanalysis of Fridrich’s chaotic image encryption scheme. Signal Process.; 2016; 132, pp. 150-154. [DOI: https://dx.doi.org/10.1016/j.sigpro.2016.10.002]

48. Liao, Y.; Lin, Y.; Li, Q.; Xing, Z.; Yuan, X. Lightweight Image Encryption Algorithm Using 4D-NDS: Compound Dynamic Diffusion and Single-Round Efficiency. IEEE Access; 2025; 13, pp. 74652-74662. [DOI: https://dx.doi.org/10.1109/ACCESS.2025.3560686]

49. Zhou, S.; Yin, Y.; Erkan, U.; Toktas, A.; Zhang, Y. Novel hyperchaotic system: Implementation to audio encryption. Chaos Solitons Fractals; 2025; 193, 116088. [DOI: https://dx.doi.org/10.1016/j.chaos.2025.116088]

50. Zhang, Y.; Wang, T.; Zhao, R.; Wen, W.; Zhu, Y. RAPP: Reversible Privacy Preservation for Various Face Attributes. IEEE Trans. Inf. Forensics Secur.; 2023; 18, pp. 3074-3087. [DOI: https://dx.doi.org/10.1109/TIFS.2023.3274359]

51. Liao, Y.; Lin, Y.; Zheng, X.; Yuan, X. Privacy Image Secrecy Scheme Based on Chaos-Driven Fractal Sorting Matrix and Fibonacci Q-Matrix. Vis. Comput.; 2025; 41, pp. 6931-6941.

52. Wen, H.; Lin, Y. Cryptanalysis of an image encryption algorithm using quantum chaotic map and DNA coding. Expert Syst. Appl.; 2023; 237, 121514. [DOI: https://dx.doi.org/10.1016/j.eswa.2023.121514]

53. Wen, H.; Lin, Y.; Feng, Z. Cryptanalyzing a bit-level image encryption algorithm based on chaotic maps. Eng. Sci. Technol. Int. J.; 2024; 51, 101634. [DOI: https://dx.doi.org/10.1016/j.jestch.2024.101634]

54. Wen, H.; Lin, Y. Cryptanalyzing an image cipher using multiple chaos and DNA operations. J. King Saud Univ.—Comput. Inf. Sci.; 2023; 35, 101612. [DOI: https://dx.doi.org/10.1016/j.jksuci.2023.101612]

55. Wen, H.; Liu, Z.; Lai, H.; Zhang, C.; Liu, L.; Yang, J.; Lin, Y.; Li, Y.; Liao, Y.; Ma, L. . Secure DNA-Coding Image Optical Communication Using Non-Degenerate Hyperchaos and Dynamic Secret-Key. Mathematics; 2022; 10, 3180. [DOI: https://dx.doi.org/10.3390/math10173180]

56. Zhang, H.; Hu, H.; Ding, W. VSDHS-CIEA: Color image encryption algorithm based on novel variable-structure discrete hyperchaotic system and cross-plane confusion strategy. Inf. Sci.; 2024; 665, 120332. [DOI: https://dx.doi.org/10.1016/j.ins.2024.120332]

57. Peng, Y.; Lan, Z.; Sun, K.; Xu, W. A simple color image encryption algorithm based on a discrete memristive hyperchaotic map and time-controllable operation. Opt. Laser Technol.; 2023; 165, 109543. [DOI: https://dx.doi.org/10.1016/j.optlastec.2023.109543]

58. Zhang, H.; Hu, H. An image encryption algorithm based on a compound-coupled chaotic system. Digit. Signal Process.; 2023; 146, 104367. [DOI: https://dx.doi.org/10.1016/j.dsp.2023.104367]

59. Song, W.; Fu, C.; Zheng, Y.; Zhang, Y.; Chen, J.; Wang, P. Batch image encryption using cross image permutation and diffusion. J. Inf. Secur. Appl.; 2024; 80, 103686. [DOI: https://dx.doi.org/10.1016/j.jisa.2023.103686]

60. Tang, S.; Xu, X.; Jiang, Z.H.; Meng, D.; Sun, K. An image encryption scheme without additional key transmission based on an N-dimensional closed-loop coupled triangular wave model. Chaos Solitons Fractals; 2024; 185, 115039. [DOI: https://dx.doi.org/10.1016/j.chaos.2024.115039]

61. Wang, M.; Teng, L.; Zhou, W.; Yan, X.; Xia, Z.; Zhou, S. A new 2D cross hyperchaotic Sine-modulation-Logistic map and its application in bit-level image encryption. Expert Syst. Appl.; 2024; 261, 125328. [DOI: https://dx.doi.org/10.1016/j.eswa.2024.125328]

62. Zhou, S.; Tao, Z.; Erkan, U.; Toktas, A.; Iu, H.H.C.; Zhang, Y.; Zhang, H. Multidimensional chaotic signals generation using deep learning and its application in image encryption. Eng. Appl. Artif. Intell.; 2025; 156, 111017. [DOI: https://dx.doi.org/10.1016/j.engappai.2025.111017]

© 2025 by the authors. Licensee MDPI, Basel, Switzerland. This article is an open access article distributed under the terms and conditions of the Creative Commons Attribution (CC BY) license (https://creativecommons.org/licenses/by/4.0/). Notwithstanding the ProQuest Terms and Conditions, you may use this content in accordance with the terms of the License.